IT PARK
    Most Popular

    Five effective business models of Internet of Things

    Jul 28, 2025

    What are the difficulties of cloud computing operations and maintenance?

    Jul 19, 2025

    Why do cloud computing costs tend to go over the top?

    Jun 20, 2025

    IT PARK IT PARK

    • Home
    • Encyclopedia

      What are "Other" and "Other System Data" on iPhone and how do I clean them up?

      Aug 01, 2025

      Cell phone "a daily charge" and "no power to recharge", which is more harmful to the battery?

      Jul 31, 2025

      Why does the phone turn off when the remaining battery is not zero

      Jul 30, 2025

      Internet era! How to prevent personal information leakage

      Jul 29, 2025

      Which one to choose for mobile power? Analysis of the three major types of battery cells

      Jul 28, 2025
    • AI

      Coping with the "blind spot" of application in the age of artificial intelligence, and finding the "point of view" from the power of time.

      Aug 01, 2025

      AI fraud is efficient and low cost, and the "three magic tricks" effectively prevent potential threats

      Jul 31, 2025

      Many people use AI to help them work: less time to work and more money to earn

      Jul 30, 2025

      Driving Generative AI Pervasiveness: Intel's "duty to do so"

      Jul 29, 2025

      First U.S. Election in the Generative AI Era

      Jul 28, 2025
    • Big Data

      3 Ways to Overcome Big Data Obstacles

      Aug 01, 2025

      How big data analytics is reshaping the future of smart cities

      Jul 31, 2025

      3 Ways to Successfully Manage and Protect Your Data

      Jul 30, 2025

      Big data is transforming education

      Jul 29, 2025

      How data can help organizations achieve their environmental goals

      Jul 28, 2025
    • CLO

      How India can seize a rare opportunity in cloud computing

      Aug 01, 2025

      To make more environmentally friendly use of the cloud IT infrastructure, start with these aspects

      Jul 31, 2025

      Cloud computing, what are the main security challenges

      Jul 30, 2025

      What is cloud computing?

      Jul 29, 2025

      Four advantages are highlighted, and cloud computing is the trend

      Jul 28, 2025
    • IoT

      Iot and Internet misconceptions, which ones do you know?

      Aug 01, 2025

      5 Secrets to Maximizing Return on Investment in IoT

      Jul 31, 2025

      The Role of Industrial IoT Technology in Smart Factories

      Jul 30, 2025

      Is it too early to exit the IoT?

      Jul 29, 2025

      Five effective business models of Internet of Things

      Jul 28, 2025
    • Blockchain

      What does blockchain mining mean?

      Aug 01, 2025

      NFT, from the "art" of Internet natives to the marketing tools of business

      Jul 31, 2025

      What are the main areas of potential application of blockchain in the construction industry?

      Jul 30, 2025

      Difference between blockchain games and regular games

      Jul 29, 2025

      What is a smart contract?

      Jul 28, 2025
    IT PARK
    Home » AI » Google has categorized 6 real-world AI attacks to prepare for immediately
    AI

    Google has categorized 6 real-world AI attacks to prepare for immediately

    There are 6 common attacks faced by modern AI systems: hinting attacks, training data extraction, backdoor manipulation of models, adversarial examples, manipulation of training data of models using data contamination attacks, and data leakage attacks.
    Updated: Jul 20, 2025
    Google has categorized 6 real-world AI attacks to prepare for immediately

    Google researchers have identified six specific attacks against real-world AI systems, finding that these common attack vectors exhibit a unique level of sophistication that they note will require a combination of adversarial simulations and the help of AI experts to build a solid defense.

    In a report released this week, the company revealed that its dedicated AI Red Team has identified a variety of threats to this rapidly evolving technology, based primarily on how attackers manipulate the Large Language Models (LLMs) that drive generative AI products like ChatGPT, Google Bard, and others.

    These attacks largely lead to technologies that produce unintended or even maliciously driven results, which can lead to consequences ranging from the mundane, such as photos of ordinary people appearing on celebrity photo sites, to the more serious, such as security-evading phishing attacks or data theft.

    Google's findings come hot on the heels of its release of the Secure Artificial Intelligence Framework (SAIF), which the company says is designed to address AI security before it's too late, as the technology has experienced rapid adoption, creating new security threats.

    6 Common Attacks Facing Modern AI Systems The first set of common attacks identified by Google are hint attacks, which involve "hint engineering." This is a term that refers to the production of effective hints that direct LLM to perform desired tasks. When this influence on the model is malicious, it can in turn maliciously influence the output of an LLM-based application in ways that are not intended, the researchers said.

    One example would be if someone added a paragraph to an AI-based phishing attack that was not visible to the end user, but could instruct the AI to classify the phishing email as legitimate. This could allow it to bypass email anti-phishing protections and increase the chances of a successful phishing attack.

    Another attack the team discovered is training data extraction, which targets the reconstruction of verbatim training examples used by LLM - such as content from the Internet.

    In this way, attackers can extract confidential information, such as verbatim personally identifiable information or passwords, from the data. "Attackers have an incentive to target personalized models or models trained on data containing personally identifiable data to collect sensitive information," the researchers wrote.

    A third potential AI attack is backdoor manipulation of models, where an attacker "may attempt to covertly alter the behavior of a model to produce outputs that are incorrectly characterized by specific 'trigger' words or features, also known as backdoors," the researchers wrote. In this type of attack, a threat actor can hide code in the model or its output to perform malicious activities.

    The fourth type of attack, called adversarial examples, is when an attacker provides an input to a model that results in a "deterministic, but highly unexpected output," the researchers wrote. In one example, the model could display an image that looks like one thing to the human eye, but the model recognizes it as something completely different. Such attacks can be fairly benign, and in one case, someone could train the model to recognize a photo of himself or herself as one deemed worthy of appearing on a celebrity website.

    An attacker could also use a data contamination attack to manipulate the model's training data to influence the model's output based on the attacker's preferences-which could also threaten the security of the software supply chain if developers are using AI to help them develop software. The impact of such an attack could be similar to backdoor manipulation of models, the researchers noted.

    The final type of attack identified by Google's specialized AI red team is a data leakage attack, in which an attacker can copy a model's file representation to steal sensitive intellectual property or other information. For example, if a model is used for speech recognition or text generation, an attacker might try to extract speech or text information from the model.

    google AI system attacks
    Previous Article First U.S. Election in the Generative AI Era
    Next Article The shift of ERP to cloud computing requires ERP channels to adapt

    Related Articles

    AI

    GPT-4 will allow users to customize the "personality" of the AI, making the avatar a real "person"

    Jul 26, 2025
    AI

    What are the young people interacting with Japan's "Buddhist AI" seeking and escaping from?

    Jul 22, 2025
    AI

    Coping with the "blind spot" of application in the age of artificial intelligence, and finding the "point of view" from the power of time.

    Aug 01, 2025
    Most Popular

    Five effective business models of Internet of Things

    Jul 28, 2025

    What are the difficulties of cloud computing operations and maintenance?

    Jul 19, 2025

    Why do cloud computing costs tend to go over the top?

    Jun 20, 2025
    Copyright © 2025 itheroe.com. All rights reserved. User Agreement | Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.